Face Detection
-
Upload
hashrashhash -
Category
Documents
-
view
4 -
download
0
description
Transcript of Face Detection
Project Title
Facial Recognition Security System
Group Members
Talha Jamshaid-FA09-BCE-051 Hashim Khan-SP08-BEE-153Israr-ul-Haq- SP08-BCE-020
Supervisor
Sir Nauman Khan Tareen
To make a security system so that we can restrict/allow a person’s access to a certain area by using facial recognition technique.
a. Camera will capture input image for detectionb. Pc/Laptop is use for storing data in database.c. Microcontroller will receive control signals from the PC and after
receiving the signal it will allow to open or close the Gate on the basis of comparison with input image and data store in data base.
•Microcontroller
Block Diagram
Detection
Recognition
Authentication
For detection purpose we are using Adabost technique which comprises of
i. Haar-Like Rectangular features
ii. Integral Imagesiii. Haar Cascaded
Haar-like features are used in face detection.
A Haar-like feature consider rectangular regions at a specific location.
Haar-like feature can be computed rapidly
using an intermediate representation
called integral image. Mathematically.
,
( , ) ( , )x x y y
ii x y i x y
Adaboost algorithm uses classifiers for Detection.
The process boosts the weak classifiers into a strong
classifier by using cascade method.a. Train a weak classifierb. Add it to the set of weak classifiersc. Increases the weights of the sample which are
still miss-classified by weak classifiersd. Go back to 1st step again.
This algorithm keep on modifying itself and finally makes a very strong classifier.
A database is defined as a computerized record keeping system.
Database can be regarded as anelectronic filing system.
We can say that it is a container whichhas collection of computerized data files.
In “FACIAL RECOGNITION SECURITY SYSTEM” database is used to store or save the templates of the images. As image templates containing the information are already stored in data base, so the input images taken by camera are compared in database images or templates and after comparison decision is given whether the image matches or not.
i. Adding new data in the existing file. ii. Deleting data from existing filesiii. Inserting data in to the existing file.iv. Changing data from the existing
file.v. Removing existing file from the
database
The three levels of the architecture of a database
are as follows a) THE INTERNAL LEVEL. b) THE EXTERNAL LEVEL. c) THE CONCEPTUAL LEVEL.
COMPACTNESS
SPEED DATA CAN BE SHARED SECURITY CAN BE ENFORCED
Role of Microcontroller in our project ?
Microcontroller will receive control signals from the PC and after receiving the signal it will allow to open or close the gate on the basis of comparison with input image and data store in data base.
In our project we are using PIC18f452 of Company name Microchip.
Why we are using pic 18f452?
We are using pic18f452 on the basis of three reasons: Pic18f452 fulfill the needs of our task efficiently and
cost effectively. The software and hardware tools such as compilers,
assemblers, debuggers and emulator are easily available. It is easily available and reliable.
PIC18f452 Features: The pic18f452 has as a RISC architecture that comes
with some standard features such as on chip, program (code) ROM, data RAM, timers, ADC and USART and input output ports.
The PIC18f452 comprises of many registers, but in our project we are using special function register and general purpose register because we are using serial communication, I/O ports and timers.
Registers in PIC18f452 Microcontroller SFR (bytes) GPR (bytes)
PIC18f452 256 1536
MicrocontrollerName
Code ROM
Data RAM
Data EEPROM
I/O Pins
ADC Timers Pin #
&Package
PIC18f452 32K 1536 256 34 10-bit
4 40 DIP